Microsoft Exchange 2019

Exchange 2019

 

An update for the mail server: Microsoft has made important improvements to their popular software with Exchange 2019. The focus is now on higher security and improved performance. At the same time, a prominent feature of the previous version has been eliminated. Is it worth...

 

CMS comparison

CMS comparison 2019: The 5 most popular open source systems

 

Range of functions, ease of use, and technical aspects: If you’re searching for the right content management system (CMS) for your website, many factors must be taken into consideration. Worlds lie between a small blog and a huge company website, but sometimes the same system is...

 

Buyer personas for optimal targeting

Buyer personas: Getting to know your customers better

 

When it comes to online marketing, data is what counts most today. But what good is the information you have collected and analyzed if you address indefinite groups of people in your messages? It is better to identify the people behind the data set and focus on them. Creating...

 

Perfect out of office message: Examples and templates

How to create the perfect out of office message

 

The out of office message is a crucial part of email communication in the workplace. If you don’t have access to your email, your contacts will want to know when you’ll be back and whether or not you’ll be represented by someone else in your absence. An out of office reply may be...

 

Conversational Marketing

What is Conversational Marketing?

 

Conversational marketing is a hot topic for SMBs looking to change the way they reach out to new and existing customers. Learn more about how to engage customers on a one-to-one basis and grow your business with a more human approach to marketing.

 

The best Alexa Skills

Amazon Echo upgrade: the best Alexa Skills

 

So you think Alexa can do a lot? Well, it’s now possible to add even more capabilities to the smart Amazon Echo speaker. If you network it with external providers, you can extend the pre-configured functions with different applications. With Amazon Alexa Skills, Alexa becomes a...

 

Web hosting: servers by comparison

Carry out a server comparison and you will notice that website operators have a large selection to choose from. Professional hosts offer virtual, dedicated, and cloud based servers in different performance levels. How do these server models differ from one another? What features does a root server have in comparison to a managed server? Which type of hosting is best for your web project? Take a...

Introduction to Linux directory rights

With Linux, access rights for directories and files are often set through the terminal. There, file owners can be defined and groups can be assigned. With the command, chmod, user classes can be assigned certain file rights. Access rights in the Unix file system can be changed in two different ways: symbolic or numeric. Find out more about both notation types here.

DoS: attack patterns and countermeasures

´It is very important for a server service to always be available since this is directly related to an online company’s success. Many servers are susceptible to DoS and DDoS attacks, which cause overloads and trigger costly crashes . But which patterns do these attacks follow and which counter measures can be put into place in order to protect critical systems from being targeted?

Buying a complete website: what is there to know?

Instead of creating a website yourself, buying a ready-made website is also an option. This way you can reduce your workload and receive a complete web presence including existing visitors and customer base. But which risks are associated with buying a ready-made website? And what costs can you expect?

Website security: how to protect your web presence

Would you leave your window open at night if you knew there were intruders lurking about? Obviously the answer to this question is ‘no’. Many companies and individuals leave their virtual window open to cyber criminals by not adequately protecting their websites. Website security is an extremely important topic. Only by regularly carrying out security checks and following the proper precautions...

Malware on the server: consequences and countermeasures

A website operator is responsible for the security of a web project as well as the content. Neglecting security may lead to hackers easily infiltrating the system through security gaps. If a malware-infected website goes unnoticed, it could cause serious damage. It is therefore important to make sure your site is fully protected.

Four reasons to switch to cloud hosting

Say goodbye to dedicated server hosting. The future belongs to the cloud. Still not sure if you should make the switch to flexible Cloud hosting? These four arguments for a contemporary web hosting strategy illustrate how you can achieve effective IT requirements for a competitive business.

MySQLDumper: from installation to backup

“Data is the new oil!”. So when it comes to online businesses, loss of data means loss of capital. Important and sensitive data should be backed up at regular intervals. Thanks to free programs such as MySQLDumper you can create MySQL database backups in minutes! Once installed, you can use the software to automatize and administer backups.

Cloud Hosting: a reputation worth defending

For many, the cloud is a place where private documents, music, pictures, or videos can be stored and exchanged online. Understanding the different technological aspects of these services, however, proves to be a cloudy venture for many. Did you know, for example, that, in addition to many other things, online stores and websites can also be hosted in the cloud?

Get a more secure data transfer with WinSCP

Are you still transferring your data online over an unencrypted connection via FTP (File Transfer Protocol)? WinSCP offers a comfortable and secure alternative to the current FTP client programs for the operating system, Windows. The encrypted network connection is based on the implementation of Secure Shell (SHH) and enables a fast data transfer via SCP (Secure Copy) and the flexible remote...

1